Credential-stuffing

Credential Stuffing Phishing

In a few surveys, it was estimated that nearing 81% of users reuse the same login and 25% use the same password across multiple accounts. Given that there are many cybercriminals that are successfully breaching various systems, all they have to have is stolen credentials that consist of usernames, emails and the corresponding passwords. Credential stuffing is a cyberattack that makes use of this information by automating logins to anywhere
Explaining Tabnabbing Phishing

Explaining Tabnabbing Phishing

Tabnabbing has been one of the tried and true forms of phishing since around 2010. The attacker takes advantage of the fact that many people are busy and don’t pay attention to the tabs that they open in their browser. The cyber criminal’s ability to imitate credible website views allows them to appear like a webpage so that the user can input their credentials.  The name tabnabbing was created by
What Happens After a Session Hijacking Attack

What Happens After a Session Hijacking Attack

The fact that almost any network or computer session is vulnerable to session hijacking should give pause to everyone. While these forms of cyberattacks typically happen to web applications and browser session, they do also rely on knowing the cookie session of the victim which is also called cookie side-jacking or cookie hijacking. Many often find out about a session hijacking after the fact and once breached, put defense systems
Session Hijacking: Another Form of Cyber Attack

Session Hijacking: Another Form of Cyber Attack

Almost all systems are vulnerable to session hijacking and they can be a serious threat to web applications and networks. Session hijacking, also known as “token hijacking” allows the attackers to have access to a network without the requirement of authentication. Once in, the cybercriminals know that they won’t need to have to be concerned about authentication as long as the session is active. The cybercriminals have the same access
Small Business Cybersecurity Toolkit- Part 2 of 2

Small Business Cybersecurity Toolkit- Part 2 of 2

Cybersecurity is one of the top considerations and should be considered part of the cost of doing business. Small companies are often left out with little or no information, abilities, or resources to protect their investments. Implementing best cybersecurity practices can be a challenge for most small companies, however, organizing system-wide actions can save time, money, and a company’s reputation against cyberattacks. Creating a cyber readiness culture means that everyone